Received: by 2002:ac0:a679:0:0:0:0:0 with SMTP id p54csp990697imp; Thu, 21 Feb 2019 15:54:17 -0800 (PST) X-Google-Smtp-Source: AHgI3IacuP0yVogekP/qDJaRuCdXHJJ58cUoAj184YBqXSx/moTwTN1PBrXeomzCCa2hzJjoVVLm X-Received: by 2002:aa7:838c:: with SMTP id u12mr1116282pfm.189.1550793257574; Thu, 21 Feb 2019 15:54:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550793257; cv=none; d=google.com; s=arc-20160816; b=hgMMSU8lPuuU37a0VEcetu/JAmIztFm8gZRXyMJJI4byoCZX4FRWMgVCWsM+PlARLA ldgeBI/COH0tkNf5TkY2jPEqYsXSVbfYA0dBWm9Cy5nE355GPbLDzAP49JSfJg1S5Yj9 1RVkgTsYdZrYOdkmU/Aim33jHFERDemT3WieuGJcV3i3kv9xMtmhaKN4ccE0+KU/Iemz s0oDdOMH5GyZDOWtJpfcj4Fzgi/M90Os6o3FngjMwHl5kkr2YpJVlghLH6WPLwJomxSB W9QOj7mqi97vKqSLnXjOA6zmbPtKaU2SqVgkWi8u0g+z/nCXFwMiI0zRG3nC7sqnq44D l4Iw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=hQkTPFjoHK3661xQlHVp+31XY04uuglTGuhGFhn0F6E=; b=fHQyuFh6y2dHoctRuhexNHbyNNRRx5yQZxpNqneqGkr954us6bioD1F1U4Oen+4j2i l4a6o8zmJBWsD/ljxfQTOjRGYOBBMv8Y3JqsbVMA1eCjDflzs31nnx/fBvh9SUs96+Ot zMlCsvUyFITM/IVjTjysnwpF/SmIc4fP2dYOxQD0Y6iE1nwvq07/4iNRip9GPwKB+GIS k3L4DkxUrqT6RGVkeDnOZ4nZuOADaa05yQiNBVNv2clOzusSZKhk0Oo9HKkgilxsjLBZ Md1tgr+LwcJB5FywbYynxT4G7m8fT852s3t+2m4M5sRWSztrHBlypkLpYRIK4YXfWoT1 eEpw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b9si225251plr.66.2019.02.21.15.54.02; Thu, 21 Feb 2019 15:54:17 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727145AbfBUXvD (ORCPT + 99 others); Thu, 21 Feb 2019 18:51:03 -0500 Received: from mga14.intel.com ([192.55.52.115]:3152 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727092AbfBUXvC (ORCPT ); Thu, 21 Feb 2019 18:51:02 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by fmsmga103.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 21 Feb 2019 15:51:00 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.58,397,1544515200"; d="scan'208";a="322394844" Received: from linksys13920.jf.intel.com (HELO rpedgeco-DESK5.jf.intel.com) ([10.54.75.11]) by fmsmga005.fm.intel.com with ESMTP; 21 Feb 2019 15:50:59 -0800 From: Rick Edgecombe To: Andy Lutomirski , Ingo Molnar Cc: linux-kernel@vger.kernel.org, x86@kernel.org, hpa@zytor.com, Thomas Gleixner , Borislav Petkov , Nadav Amit , Dave Hansen , Peter Zijlstra , linux_dti@icloud.com, linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, akpm@linux-foundation.org, kernel-hardening@lists.openwall.com, linux-mm@kvack.org, will.deacon@arm.com, ard.biesheuvel@linaro.org, kristen@linux.intel.com, deneen.t.dock@intel.com, Nadav Amit , Rick Edgecombe Subject: [PATCH v3 08/20] x86/ftrace: Set trampoline pages as executable Date: Thu, 21 Feb 2019 15:44:39 -0800 Message-Id: <20190221234451.17632-9-rick.p.edgecombe@intel.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20190221234451.17632-1-rick.p.edgecombe@intel.com> References: <20190221234451.17632-1-rick.p.edgecombe@intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Nadav Amit Since alloc_module() will not set the pages as executable soon, set ftrace trampoline pages as executable after they are allocated. For the time being, do not change ftrace to use the text_poke() interface. As a result, ftrace still breaks W^X. Reviewed-by: Steven Rostedt (VMware) Signed-off-by: Nadav Amit Signed-off-by: Rick Edgecombe --- arch/x86/kernel/ftrace.c | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/arch/x86/kernel/ftrace.c b/arch/x86/kernel/ftrace.c index 8257a59704ae..13c8249b197f 100644 --- a/arch/x86/kernel/ftrace.c +++ b/arch/x86/kernel/ftrace.c @@ -742,6 +742,7 @@ create_trampoline(struct ftrace_ops *ops, unsigned int *tramp_size) unsigned long end_offset; unsigned long op_offset; unsigned long offset; + unsigned long npages; unsigned long size; unsigned long retq; unsigned long *ptr; @@ -774,6 +775,7 @@ create_trampoline(struct ftrace_ops *ops, unsigned int *tramp_size) return 0; *tramp_size = size + RET_SIZE + sizeof(void *); + npages = DIV_ROUND_UP(*tramp_size, PAGE_SIZE); /* Copy ftrace_caller onto the trampoline memory */ ret = probe_kernel_read(trampoline, (void *)start_offset, size); @@ -818,6 +820,12 @@ create_trampoline(struct ftrace_ops *ops, unsigned int *tramp_size) /* ALLOC_TRAMP flags lets us know we created it */ ops->flags |= FTRACE_OPS_FL_ALLOC_TRAMP; + /* + * Module allocation needs to be completed by making the page + * executable. The page is still writable, which is a security hazard, + * but anyhow ftrace breaks W^X completely. + */ + set_memory_x((unsigned long)trampoline, npages); return (unsigned long)trampoline; fail: tramp_free(trampoline, *tramp_size); -- 2.17.1